CodeShare
Have some code. Share some code.
cancel
Showing results for 
Search instead for 
Did you mean: 
Custom Alert Banner
PeteWhite
F5 Employee
F5 Employee

Problem this snippet solves:

This is a simple Python script that translates Radware text configuration file and outputs as config snippet and certificate files.

$ ./rad2f5
Usage: rad2f5 <filename> [partition]

Example:

./rad2f5 radwareconfig.txt MyPartition
Using partition /MyPartition/
IP routes:46
Non-floating IP interfaces:26
Floating IP interfaces:19
Monitors:349
Virtual Servers:430
Pools:152
Certificates: 31
SSL profiles: 17
WARNING! Found L7 Regular Expression at "appdirector l7 farm-selection method-table setCreate l7Rule-Redirect"
Layer 7 rules:12
Layer 7 policies:4

!!  Copy all certificate files to BIG-IP /var/tmp and use load_certs.sh to load
!!
#         Configuration
#--------------------------------------#
ltm policy /MyPartition/l7rule-Redirect {
    controls { forwarding }
    requires { http }
    rules {
            Redirect {
                    actions {
                            0 {
                                    forward
                                    select
                                    pool SORRYPOOL
                             }

                     }
            ordinal 1
            }
    }
net route /MyPartition/10.20.30.40_32 {
    network 10.20.30.40/32
    gateway 10.1.1.1
}

How to use this snippet:

This includes translation of routes and non-floating self-IPs, monitors, pools, virtual servers, certificates, SSL profiles and some layer 7 rules.

To install, either download the file attached here, extract and run it or use pip:

pip install rad2f5

To load the configuration to the f5 device, output to a file eg

./rad2f5 filename>newcfg.txt
, remove the statistics header from the file with a text editor, upload the file into /var/tmp on the BIG-IP and test loading with
tmsh load sys config merge file /var/tmp/<filename> verify
. Fix any issues and load with
tmsh load sys config merge file /var/tmp/<filename>

The script will also output the certificates and keys which should be uploaded to the BIG-IP /var/tmp directory and run file check_certs.sh and load_certs.sh to check and load the certs and keys.

Works with Python v2 and v3.

If you want something to be added then message me with details of the text and i will try to add it.

Feel free to add or change anything

Code :

#!/usr/bin/env python
# v1.1    14/3/2018  Deal with lack of text in monitors ( line 157 )
# v2      3/1/2019 Updated after changes suggested by Avinash Piare
# v3      6/11/2019 Updated to deal with \\r\n at the end of the line
# v3.1    6/11/2019 Minor changes to handle VS names with spaces
# 3.4     18/4/2020 Fixed minor issues
# Peter White 6/11/2019
# usage ./rad2f5  [partition]
import sys
import re
import textwrap
import ipaddress

print ("Running with Python v" + sys.version)

# Set debug to true to output the workings of the script ie the arrays etc
debug = False

def parse_options(options):
    # Function to split options and return a dict containing option and value
    # Example: -pl 27 -v 123 -pa 172.28.1.234
    # Return: { 'pl':'27', 'v':'123', 'pa':'172.28.1.234' }
    output = dict()
    # Deal with non-quotes eg -b 12345
    for r in re.finditer(r'-(\w{1,3}) (\S+)',options):
        output[r.group(1)] = r.group(2)
    # Deal with quotes eg -u "User Name"
    for v in re.finditer(r'-(\w{1,3}) (".+")',options):
        output[v.group(1)] = v.group(2)
    return output

def splitvars(vars):
    # Split a string on | and then =, return a dict of ABC=XYZ
    # eg HDR=User-Agent|TKN=Googlebot-Video/1.0|TMATCH=EQ|
    # Return is { 'HDR':'User-Agent','TKN': 'Googlebot-Video/1.0', 'TMATCH': 'EQ' }
    vlist = vars.split("|")
    o = {}
    for v in vlist:
        if v == '':
            continue
        w = v.split("=")
        if len(w) > 1:
            o[w[0]] = w[1]
        else:
            o[w[0]] = ''
    return o        
    
def array_add(a,d):
    # Function to safely add to an array
    #global a
    if not len(a):
        a = [ d ]
    else:
        a.append( d )
    return a
    
def setup_pools(name):
    global pools
    if not name in pools:
        pools[name] = { 'destinations': [], 'member-disabled': [], 'member-ids': [], 'priority-group': [] }
    else:
        if not 'destinations' in pools[name]:
            pools[name]['destinations'] = []
        if not 'member-disabled' in pools[name]:
            pools[name]['member-disabled'] = []
        if not 'member-ids' in pools[name]:
            pools[name]['member-ids'] = []
        if not 'priority-group' in pools[name]:
            pools[name]['priority-group'] = []    

def getVsFromPool(poolname):
    # This retrieves the names of virtual servers that use a specific pool
    global farm2vs
    if poolname in farm2vs:
        return farm2vs[poolname]
    else:
        return False

def is_ipv6(ip):
    if ':' in ip:
        return True
    else:
        return False

# Check there is an argument given
if not len(sys.argv) > 1:
    exit("Usage: rad2f5  [partition]")
if len(sys.argv) > 2:
    # Second command-line variable is the partition
    partition = "/" + sys.argv[2] + "/"
    print ("Using partition " + partition)
else:
    partition = "/Common/"
    
# Check input file
fh = open(sys.argv[1],"r")
if not fh:
    exit("Cannot open file " + argv[1])
rawfile = fh.read()

# v2
# Remove any instances of slash at the end of line
# eg health-monitoring check create\
# HC_DNS -id 5 -m DNS -p 53 -a \
#HOST=ns.domain.com|ADDR=1.1.1.1| -d 2.2.2.2
#file = re.sub('^security certificate table\\\\\n','',rawfile)
file = re.sub('\\\\\n','',rawfile)
file = re.sub('\\\\\r\n','',file)

################     LACP trunks    ##########################
#
#
#
#############################################################
#net linkaggr trunks set T-1 -lap G-13,G-14 -lam Manual -lat Fast -law 3 -laa 32767
trunks = {}
for r in re.finditer(r'net linkaggr trunks set (\S+) (.+)',file):
    name = r.group(1)
    options = parse_options(r.group(2))
    if 'lap' in options:
        # Manage interfaces
        ints = options['lap'].split(',')
        trunks[name] = { 'interfaces': ints } 
print ("LACP trunks:" + str(len(trunks)))
if debug:
    print('DEBUG LACP trunks: ' + str(trunks))

################     IP routes    ##########################
#
#
#
#############################################################
routes = {}
for r in re.finditer(r'net route table create (\S+) (\S+) (\S+) (\S+)',file):
    if r.group(1) == '0.0.0.0':
        name = 'default'
    else:
        name = r.group(1) + "_" + r.group(2)
    routes[name] = { 'network': r.group(1), 'mask': r.group(2), 'gateway': r.group(3), 'interface': r.group(4)}  
print ("IP routes:" + str(len(routes)))
if debug:
    print('DEBUG routes: ' + str(routes))

################     Non-floating self-IPs    ###############
#
#
#
# 
#############################################################
selfIpNonFloating = {}
for s in re.finditer(r'net ip-interface create (\S+) (\S+) (.+)',file):
    output = { 'interface': s.group(2) }
    opts = parse_options(s.group(3))
    if 'pl' in opts:
        output['mask'] = opts['pl']
    if 'v' in opts:
        output['vlan'] = opts['v']
    if 'pa' in opts:
        output['peerAddress'] = opts['pa']
    selfIpNonFloating[s.group(1)] = output
print ("Non-floating IP interfaces:" + str(len(selfIpNonFloating)))
if debug:
    print("DEBUG non-floating IPs: " + str(selfIpNonFloating))


################     Floating self-IPs    ###################
#
#
# 
#############################################################
selfIpFloating = {}
for s in re.finditer(r'redundancy vrrp virtual-routers create (\S+) (\S+) (\S+) (.+)',file):
    output = { 'version': s.group(1),'interface': s.group(3), 'ipAddresses': []}
    opts = parse_options(s.group(4))
    #if 'as' in opts:
        # Enabled - assume all are enabled
    if 'pip' in opts:
        output['peerIpAddress'] = opts['pip']
    selfIpFloating[s.group(2)] = output

# Retrieve IP addresses for Floating self-IPs
#
for s in re.finditer(r'redundancy vrrp associated-ip create (\S+) (\S+) (\S+) (\S+)',file):
    selfIpFloating[s.group(2)]['ipAddresses'] = array_add(selfIpFloating[s.group(2)]['ipAddresses'],s.group(4))
print ("Floating IP interfaces:" + str(len(selfIpFloating)))
if debug:
    print("DEBUG Floating IPs: " + str(selfIpFloating))


################     Monitors    ###########################
#
# -m XYZ is the monitor type may or may not be present ( not present for icmp type )
# -id is the monitor ID, -p is the port, -d is the destination
# 
#############################################################
monitors = {}
for m in re.finditer(r'health-monitoring check create (\S+) (.+)',file):
    output = { 'name': m.group(1) }
    opts = parse_options(m.group(2))
    if 'id' in opts:
        id = opts['id']
    else:
        print ("No ID for monitor " + m.group(1))
        continue
    if 'm' in opts:
        output['type'] = opts['m']
    else:
        output['type'] = 'icmp'
    if 'a' in opts:
        output['text'] = opts['a']
    else:
        # Added in v2
        output['text'] = ''
    if 'p' in opts:
        output['port'] = opts['p']
    else:
        output['port'] = ''
    monitors[id] = output

print ("Monitors:" + str(len(monitors)))
if debug:
    print("DEBUG Monitors:" + str(monitors))

################     Virtual Servers    #####################
#
# 0 = name, 1= IP, 2=protocol, 3=port, 4=source 5=options
# -ta = type, -ht = http policy, -fn = pool name, -sl = ssl profile name, -ipt = translation?
# -po = policy name
# 
#############################################################
farm2vs = {}
virtuals = {}
snatPools = {}
for v in re.finditer(r'appdirector l4-policy table create (\S+) (\S+) (\S+) (\S+) (\S+) (.*)',file):
    # Puke if VS has quotes
    if v.group(1).startswith('"'):
        name = v.group(1).strip('"').replace(' ','_') + v.group(2).strip('"').replace(' ','_')
        address,protocol,port = v.group(3),v.group(4),v.group(5)
        source = v.group(6).split(' ')[0]
        options = ' '.join(v.group(6).split(' ')[1:])
    else:
        name,address,protocol,port,source,options = v.group(1),v.group(2),v.group(3),v.group(4),v.group(5),v.group(6)
    opts = parse_options(options)
    # Get rid of ICMP virtual servers
    if protocol == 'ICMP':
        continue
    
        print ("Name " + name + " has quotes, address: " + address + " protocol: " + protocol)
    if port == 'Any':
        port = '0'
    output = {'source': source, 'destination': address + ":" + port, 'protocol': protocol, 'port': port }
    if 'fn' in opts:
        output['pool'] = opts['fn']
        if not opts['fn'] in farm2vs:
            farm2vs[opts['fn']] = []
        farm2vs[opts['fn']].append(name)
    output['port'] = port
    if 'po' in opts:
        output['policy'] = opts['po']
    if 'ipt' in opts:
        output['snat'] = 'snatpool_' + opts['ipt']
        if not 'snatpool_' + opts['ipt'] in snatPools:
            #Create snatpool
            snatPools['snatpool_' + opts['ipt']] = { 'members': [opts['ipt']] }
            
    # Set the correct profiles
    profiles = []
    # Layer 4
    if protocol == "TCP" or protocol == "UDP":
        profiles.append(protocol.lower())
    else:
        profiles.append('ipother')
    # http
    if port == '80' or port == '8080':
        profiles.append('http')
        profiles.append('oneconnect')

    # ftp
    if port == '21':
        profiles.append('ftp')

    # RADIUS
    if port == '1812' or port == '1813':
        profiles.append('radius')

    # SSL
    if 'sl' in opts:
        profiles.append(opts['sl'])
        profiles.append('http')
        profiles.append('oneconnect')
    output['profiles'] = profiles
    #        
    virtuals[name] = output
    
print ("Virtual Servers:" + str(len(virtuals)))
if debug:
    print("DEBUG Virtual Servers:" + str(virtuals))
    #print("DEBUG Farm to VS Mapping:" + str(farm2vs))

    

################     Pools   ###############################
#
# Pools config options are distributed across multiple tables
# This sets the global config such as load balancing algorithm
# -dm This sets the distribution method. cyclic = Round Robin, Fewest Number of Users = least conn, Weighted Cyclic = ratio, Response Time = fastest
# -as this is the admin state
# -cm is the checking method ie monitor
# -at is the activation time
#############################################################
pools = {}
for p in re.finditer(r'appdirector farm table setCreate (\S+) (.*)',file):
    name = p.group(1)
    setup_pools(name)
    opts = parse_options(p.group(2))
    output = {}
    # Admin state
    output['poolDisabled'] = False
    if 'as' in opts:
        if opts['as'] == 'Disabled':
            output['poolDisabled'] = True            
    # Deal with distribution methods
    method = 'round-robin'
    if 'dm' in opts:
        if opts['dm'] == '"Fewest Number of Users"':
            method = 'least-conn'
        elif opts['dm'] == 'Hashing':
            method = 'hash'
        else:
            method = 'round-robin'
    output['lbMethod'] = method
    
    if 'at' in opts:
        output['slowRamp'] = opts['at']
    pools[name] = output
# This sets the pool members
# 0=name, 1=node, 2=node address, 3=node port, 4=? -id =id -sd ? -as admin state eg Disable, -om operation mode eg Backup ( fallback server ), -rt backup server address 0.0.0.0
for p in re.finditer(r'appdirector farm server table create (\S+) (\S+) (\S+) (\S+) (\S+) (.*)',file):
    name,node,node_address,node_port,node_hostname = p.group(1),p.group(2),p.group(3),p.group(4),p.group(5)
    opts = parse_options(p.group(6))
    setup_pools(name)
    if node_port == 'None':
        node_port = '0'
    pools[name]['destinations'] = array_add(pools[name]['destinations'],node_address + ":" + node_port)
    # Manage monitor
    if node_port == '80' or node_port == '8080':
        monitor = 'http'
    elif node_port == '443':
        monitor = 'https'
    elif node_port == '53':
        monitor = 'dns'
    elif node_port == '21':
        monitor = 'ftp'
    elif node_port == '0':
        monitor = 'gateway-icmp'
    else:
        monitor = 'tcp'
    pools[name]['monitor'] = monitor
    
    # Retrieve pool member ID
    if 'id' in opts:
        pools[name]['member-ids'] = array_add(pools[name]['member-ids'],opts['id'])
    else:
        print ("ID not found for pool " + name)
    
    # Check if member is disabled
    if 'as' in opts and opts['as'] == 'Disabled':
        # This pool member is disabled
        pools[name]['member-disabled'] = array_add(pools[name]['member-disabled'],True)
    else:
        pools[name]['member-disabled'] = array_add(pools[name]['member-disabled'],False)
    
    # Check if member is backup ie Priority Groups
    if 'om' in opts and opts['om'] == 'Backup':
        pools[name]['priority-group'] = array_add(pools[name]['priority-group'],20)
    else:
        pools[name]['priority-group'] = array_add(pools[name]['priority-group'],0)

        
        
print ("Pools:" + str(len(pools))  )
if debug:
    print("DEBUG pools: " + str(pools))

################     SSL certificates    ###################
#
#
#Name: certificate_name \
#Type: certificate \
#-----BEGIN CERTIFICATE----- \
#MIIEcyFCA7agAwIAAgISESFWs9QGF
# 
#############################################################
certs = {}
for r in re.finditer(r'Name: (\S+) Type: (\S+) (-----BEGIN CERTIFICATE-----.+?-----END CERTIFICATE-----)',file):
    name,type,text = r.group(1),r.group(2),r.group(3)
    certs[name] = { 'type': type,'text': text.replace(' \\\r\n','') }
    # Print out to file or something
print ("SSL Certificates: " + str(len(certs)))
if debug:
    print("DEBUG certs: " + str(certs))
    
################     SSL Keys    ###################
#
#
#Name: New_Root_Cert Type: key Passphrase:  -----BEGIN RSA PRIVATE KEY----- Proc-Type: 4,ENCRYPTED DEK-Info:   [key] [key] -----END RSA PRIVATE KEY----- \
# 
#############################################################
keys = {}
# Keys with passphrase
for r in re.finditer(r'Name: (\S+) Type: key Passphrase: (\S+) (-----BEGIN RSA PRIVATE KEY-----.+?-----END RSA PRIVATE KEY-----)',file):
    name,passphrase,text = r.group(1),r.group(2),r.group(3)
    keys[name] = { 'passphrase': passphrase,'text': text.replace(' \\\r\n','') }
# Keys without passphrase
for r in re.finditer(r'Name: (\S+) Type: key (-----BEGIN RSA PRIVATE KEY-----.+?-----END RSA PRIVATE KEY-----)',file):
    name,text = r.group(1),r.group(2)
    keys[name] = { 'text': text.replace(' \\\r\n','') }
print ("SSL Keys: " + str(len(keys)))
if debug:
    print("DEBUG SSL keys: " + str(keys))

################     SSL profiles    ########################
#
# -c is cert, -u is ciphers, -t is chain cert, -fv - versions
##############################################################
sslProfiles = {}
for s in re.finditer(r'^appdirector l4-policy ssl-policy create (\S+) (.+)',file.replace('\\\r\n',''),re.MULTILINE):
    name = s.group(1)
    output = {}
    opts = parse_options(s.group(2))
    if 'c' in opts:
        # Certificate
        output['certificate'] = opts['c']
    if 't' in opts:
        # Chain cert
        output['chaincert'] = opts['t']
    if 'fv' in opts:
        # TLS Version
        output['version'] = opts['fv']
    if 'u' in opts:
        # User-defined Ciphers
        output['cipher'] = opts['u']
    if 'lp' in opts:
        # ?
        output['lp'] = opts['lp']
    if 'pa' in opts:
        # ?
        output['pa'] = opts['pa']
    if 'cb' in opts:
        # ?
        output['cb'] = opts['cb']
    if 'i' in opts:
        # Backend SSL Cipher -> Values: Low, Medium, High, User Defined
        output['i'] = opts['i']
    if 'bs' in opts:
        # Backend SSL in use ie serverSSL
        output['serverssl'] = opts['bs']
        
    sslProfiles[name] = output
print ("SSL profiles: " + str(len(sslProfiles)))
if debug:
    print("DEBUG SSL Profiles: " + str(sslProfiles))
    
################     SNAT pools    ##########################
#    
# Note that this only works for addresses in the same /24 subnet
#############################################################

for s in re.finditer(r'appdirector nat client address-range create (\S+) (\S+)',file):
    name = s.group(1)
    if sys.version.startswith('2'):
        start = ipaddress.ip_address(unicode(name,'utf_8'))
        end = ipaddress.ip_address(unicode(s.group(2),'utf_8'))
    else:
        start = ipaddress.ip_address(name)
        end = ipaddress.ip_address(s.group(2))
    current = start
    ipAddresses = []
    while current <= end:
        ipAddresses.append(str(current))
        current += 1
    snatPools['snatpool_' + name] = { 'members': ipAddresses }
print ("SNAT Pools:" + str(len(snatPools)))
if debug:
    print("DEBUG SNAT Pools: " + str(snatPools))
####################################################################



################     Layer 7 functions    ##########################
#
# 
####################################################################
l7rules = { }
for r in re.finditer(r'appdirector l7 farm-selection method-table setCreate (\S+) (.+)',file):
    name = r.group(1)
    l7rules[name] = { 'match': [], 'action': [] }
    opts = parse_options(r.group(2))
    if 'cm' in opts and opts['cm'] == '"Header Field"' and 'ma' in opts:
        # This is a rule to insert a header
        params = splitvars(opts['ma'])
        if 'HDR' in params and 'TKN' in params:
            if params['TKN'] == "$Client_IP":
                params['TKN'] = '[IP::client_addr]'
            l7rules[name]['action'].append("http-header\ninsert\nname " + params['HDR'] + "\nvalue " + params['TKN'])
    
    if 'cm' in opts and opts['cm'] == 'URL' and 'ma' in opts:
        # This does a match on Host and URL
        params = splitvars(opts['ma'])
        if 'HN' in params:
            l7rules[name]['match'].append("http-host\nhost\nvalues { " + params['HN'] + " }")
        if 'P' in params:
            l7rules[name]['match'].append("http-uri\npath\nvalues { " + params['P'] + " }")
     
    if 'cm' in opts and opts['cm'] == '"Regular Expression"' and 'ma' in opts:
        params = splitvars(opts['ma'])
        if 'EXP' in params and params['EXP'] == '.':
            # This is a regex which matches everything
            print ("REGEX: " + name)
        else:
            print ("WARNING! Found L7 Regular Expression at \"appdirector l7 farm-selection method-table setCreate " + name + "\". Manually set the match in output config.")

# Note that there can be multiple entries ie multiple rules per policy
l7policies = {}
for p in re.finditer(r'appdirector l7 farm-selection policy-table setCreate (\S+) (\d+) (.+)',file):
    name = p.group(1)
    precedence = p.group(2)
    opts = parse_options(p.group(3))
        
    if 'fn' in opts:
        farm = opts['fn']
    else:
        farm = ''
    if 'm1' in opts:
        rule = opts['m1']
    if 'pa' in opts:
        # Retain HTTP Persistency (PRSST)-If the argument is ON (or undefined), AppDirector maintains HTTP 1.1
        # HTTP Redirect To (RDR)-Performs HTTP redirection to the specified name or IP address.
        # HTTPS Redirect To (RDRS)-AppDirector redirects the HTTP request to the specified name or IP address and modifies the request to a HTTPS request.
        # Redirection Code (RDRC)-Defines the code to be used for redirection.
        # RDRC=PRMN stand for Permanent I assume , as in HTTP 301
        # SIP Redirect To (RDRSIP)-Performs SIP redirection to the specified name or IP address.
        
        params = splitvars(opts['pa'])
        if 'RDR' in params:
            url = 'http://' + params['RDR']
        elif 'RDRS' in params:
            url = 'https://' + params['RDRS']
        else:
            url = ''
                    
    if not name in l7policies:
        l7policies[name] = []
    if rule in l7rules:
        if farm != '':
            l7rules[rule]['action'].append("forward\nselect\npool " + farm)
        elif url != '':
            l7rules[rule]['action'].append("http-redirect\nhost " + url)
    l7policies[name].append({ 'precedence': precedence, 'farm': farm, 'rule': rule })

print ("Layer 7 rules:" + str(len(l7rules)))
print ("Layer 7 policies:" + str(len(l7policies)))

if debug:
    print("DEBUG L7 rules: " + str(l7rules))
    print("DEBUG L7 policies: " + str(l7policies))

#
# We have retrieved the required configuration from the input file  
# Now start outputting the config




################# output SSL certificates import script  ######################
#
#
########################################################################
if len(certs):
    print ("-- Creating SSL certs and keys --")
    with open("load_certs.sh",'w') as loadScript:
        loadScript.write("#!/bin/bash\n# Script to load SSL certs and keys from /var/tmp\n")
        #####   Manage Certificates ########
        for cert in certs:
            # Write certs to load_certs.sh
            if certs[cert]['type'] == 'certificate' or certs[cert]['type'] == 'interm':
                loadScript.write("tmsh install sys crypto cert " + partition + cert + ".crt from-local-file /var/tmp/" + cert + ".crt\n")
                    
            # Create the certificate files
            with open(cert + ".crt","w") as certFile:
                for m in re.finditer(r'(-----BEGIN CERTIFICATE-----)\s?(.+)\s?(-----END CERTIFICATE-----)',certs[cert]['text']):
                    certFile.write(m.group(1) + "\n")
                    certFile.write(textwrap.fill(m.group(2),64) + "\n")
                    certFile.write(m.group(3) + "\n")
                    print ("Created SSL certificate file " + cert + ".crt")
        #####   Manage Keys #################
        for key in keys:
            # Write keys to load_certs.sh
            loadScript.write("tmsh install sys crypto key " + partition + key + ".key")
            if 'passphrase' in keys[key]:
                loadScript.write(" passphrase " + keys[key]['passphrase'])
            loadScript.write(" from-local-file /var/tmp/" + key + ".key\n")
            
            
            # Create the key files
            with open(key + ".key","w") as keyFile:
                for n in re.finditer(r'(-----BEGIN RSA PRIVATE KEY-----)(.+)(-----END RSA PRIVATE KEY-----)',keys[key]['text']):
                    keyFile.write(n.group(1) + "\n")
                    if 'Proc-Type:' in n.group(2) and 'DEK-Info:' in n.group(2):
                        # File is encrypted, separate the first lines
                        for o in re.finditer(r'(Proc-Type: \S+) (DEK-Info: \S+) (.+)',n.group(2)):
                            keyFile.write(o.group(1) + "\n")
                            keyFile.write(o.group(2) + "\n\n")
                            keyFile.write(textwrap.fill(o.group(3),64) + "\n")
                    else:
                        # File is not encrypted, output as it is
                        keyFile.write(textwrap.fill(n.group(2),64) + "\n")
                    keyFile.write(n.group(3) + "\n")
                    print ("Created SSL key file " + key + ".key")
    print ("-- Finished creating SSL certs and keys --")
    print ("!!  Copy all .crt and .key SSL files to BIG-IP /var/tmp and use load_certs.sh to load  !!"            )
    #######################################################################

    ################# output SSL certificates checking script  ######################
    #
    #
    ########################################################################
    with open("check_certs.sh",'w') as checkScript:
        checkScript.write("#!/bin/bash\n# Script to check SSL certs and keys\n")
        checkScript.write("\n# Check SSL Certs\n")
        for cert in certs:
            if certs[cert]['type'] == 'certificate' or certs[cert]['type'] == 'interm':
                checkScript.write("openssl x509 -in " + cert + ".crt -noout || echo \"Error with file " + cert + ".crt\"\n")
        
        checkScript.write("\n# Check SSL Keys\n")
        for key in keys:
            checkScript.write("openssl rsa -in " + key + ".key -check || echo \"Error with file " + key + ".key\"\n")
            
    print ("!!  Run the check_certs.sh script to check the certificates are valid  !!"            )
#######################################################################

#
#
#
#
#
#
#
#
print ("\n\n\n\n\n\n#         Configuration          \n#--------------------------------------#")
################# output policy config  #####################
#
#
#############################################################
#print ("L7 rules: " + str(l7rules))
for i in l7policies.keys():
    output = "ltm policy " + partition + i + " {\n\tcontrols { forwarding }\n\trequires { http }\n\t"
    output += "rules {\n\t"
    ordinal = 1
    for j in l7policies[i]:
        output += "\t" + j['rule'] + " { \n"
        if len(l7rules[j['rule']]['match']):
            # Deal with conditions
            output += "\t\t\tconditions { \n"
            l = 0
            for k in l7rules[j['rule']]['match']:
                output += "\t\t\t\t" + str(l) + " { \n\t\t\t\t\t" + k.replace('\n','\n\t\t\t\t\t')
                l += 1
                output += "\n\t\t\t\t }\n"
            output += "\n\t\t\t }\n"
        if len(l7rules[j['rule']]['action']):
            # Deal with actions
            output += "\t\t\tactions { \n"
            m = 0
            for n in l7rules[j['rule']]['action']:
                output += "\t\t\t\t" + str(m) + " { \n\t\t\t\t\t" + n.replace('\n','\n\t\t\t\t\t') 
                m += 1
                output += "\n\t\t\t\t }\n"
            output += "\n\t\t\t }\n"
        output += "\t\tordinal " + str(ordinal)
        output += "\n\t\t}\n\t"
        ordinal += 1
    output += "\n\t}\n}\n"
    print (output)


################# output LACP trunk config  ##############
#
#
#############################################################
for trunk in trunks.keys():
    output = "net trunk " + partition + trunk + " {\n"
    if 'interfaces' in trunks[trunk]:
        output += "\tinterfaces {\n"
        for int in trunks[trunk]['interfaces']:
            output += "\t\t" + int + "\n"
        output += "\t}\n"
    output += "}\n"
    print (output)
    
################# output vlan config  ##############
#
#
#############################################################
        
for ip in selfIpNonFloating.keys():
    output = ""
    if 'vlan' in selfIpNonFloating[ip]:
        vlanName = "VLAN-" + selfIpNonFloating[ip]['vlan']
        output += "net vlan " + partition + vlanName + " {\n"
        if 'interface' in selfIpNonFloating[ip]:
            output += "\tinterfaces {\n"
            output += "\t\t" + selfIpNonFloating[ip]['interface'] + " {\n"
            output += "\t\t\ttagged\n\t\t}\n"
            output += "\t}\n"
        output += "\ttag " + selfIpNonFloating[ip]['vlan'] + "\n}\n"
    print(output)
            
################# output non-floating self-ip config  #######
#
#
#############################################################
for ip in selfIpNonFloating.keys():
    output = ""
    if 'mask' in selfIpNonFloating[ip]:
        mask = "/" + selfIpNonFloating[ip]['mask']
    else:
        if is_ipv6(ip):
            mask = "/64"
        else:
            mask = "/32"
    if 'vlan' in selfIpNonFloating[ip]:
        vlanName = "VLAN-" + selfIpNonFloating[ip]['vlan']
    else:
        continue

    output += "net self " + partition + "selfip_" + ip + " {\n\taddress " + ip + mask + "\n\t"
    output += "allow-service none\n\t"
    output += "traffic-group traffic-group-local-only\n"
    output += "\tvlan " + vlanName + "\n"
    output += "}\n"
    print (output)
    
################# output network route config  ##############
#
#
#############################################################
for route in routes.keys():
    network,mask,gateway = routes[route]['network'],routes[route]['mask'],routes[route]['gateway']
    output = "net route " + partition + route + " {\n\tnetwork " + network + "/" + mask + "\n\t"
    output += "gateway " + gateway + "\n}"
    print (output)
        
################# output SSL profiles config  ##########################
#
#
########################################################################
for s in sslProfiles:
    #print (str(sslProfiles[s]))
    output = "ltm profile client-ssl " + partition + s + " {\n"
    output += "\tcert-key-chain { " + s + " { cert "
    output += sslProfiles[s]['certificate'] + ".crt "
    output += " key "
    output += sslProfiles[s]['certificate'] + ".key "
    if 'chaincert' in sslProfiles[s]:
        output += "chain " + sslProfiles[s]['chaincert']
    output += " }\n\tdefaults-from /Common/clientssl\n}\n"
    print (output)
    if 'serverssl' in sslProfiles[s]:
        print("WARNING: VSs using Client SSL profile " + s + " should have Server SSL profile assigned")
    
################# output monitor config  ####################
#
#
#############################################################
for m in monitors.keys():
    if monitors[m]['type'] == '"TCP Port"':
        output = "ltm monitor tcp " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/tcp\n}\n"
    if monitors[m]['type'] == '"UDP Port"':
        output = "ltm monitor udp " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/udp\n}\n"
    if monitors[m]['type'] == 'HTTP':
        '''
        https://webhelp.radware.com/AppDirector/v214/214Traffic%20Management%20and%20Application%20Acceleration.03.001.htm
        https://webhelp.radware.com/AppDirector/v214/HM_Checks_Table.htm
        Arguments:
        Host name - HOST=10.10.10.53
        path - PATH=/hc.htm
        HTTP Header
        HTTP method - MTD=G (G/H/P)
        send HTTP standard request or proxy request - PRX=N
        use of no-cache - NOCACHE=N
        text for search within a HTTP header and body, and an indication whether the text appears
        Username and Password for basic authentication
        NTLM authentication option - AUTH=B
        Up to four valid HTTP return codes - C1=200
        -a PATH=/hc.htm|C1=200|MEXIST=Y|MTD=G|PRX=N|NOCACHE=N|AUTH=B|
         '''
        output = "ltm monitor http " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/http\n"
        vars = splitvars(monitors[m]['text'])
        output += "\tsend \""
        if 'MTD' in vars:
            if vars['MTD'] == 'G':
                output += "GET "
            elif vars['MTD'] == 'P':
                output += "POST "
            elif vars['MTD'] == 'H':
                output += "HEAD "
            else:
                output += "GET "
        if 'PATH' in vars:
            output += vars['PATH'] + ' HTTP/1.0\\r\\n\\r\\n"\n'
        if 'C1' in vars:
            output += "\trecv \"^HTTP/1\.. " + vars['C1'] + "\"\n"
        output += "}\n"
    if monitors[m]['type'] == 'HTTPS':
        output = "ltm monitor https " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/https\n"
        vars = splitvars(monitors[m]['text'])
        output += "\tsend \""
        if 'MTD' in vars:
            if vars['MTD'] == 'G':
                output += "GET "
            elif vars['MTD'] == 'P':
                output += "POST "
            elif vars['MTD'] == 'H':
                output += "HEAD "
            else:
                output += "GET "
        if 'PATH' in vars:
            output += vars['PATH'] + ' HTTP/1.0\\r\\n\\r\\n"\n'
        output += "}\n"
    if monitors[m]['type'] == 'LDAP':
        '''
        The Health Monitoring module enhances the health checks for LDAP servers by allowing performing searches in the LDAP server. Before Health Monitoring performs the search, it issues a Bind request command to the LDAP server.
        After performing the search, it closes the connection with the Unbind command. A successful search receives an answer from the server that includes a "searchResultEntry" message. An unsuccessful search receives an answer that only includes only a "searchResultDone" message.
        Arguments:
        Username    A user with privileges to search the LDAP server.
        Password    The password of the user.
        Base Object The location in the directory from which the LDAP search begins.
        Attribute Name  The attribute to look for. For example, CN - Common Name.
        Search Value    The value to search for.
        Search scope    baseObject, singleLevel, wholeSubtree
        Search Deref Aliases    neverDerefAliases, dereflnSearching, derefFindingBaseObj, derefAlways
        USER=cn=healthcheck,dc=domain|PASS=1234|BASE=dc=domain|ATTR=cn|VAL=healthcheck|SCP=1|DEREF=3|
        '''
        output = "ltm monitor ldap " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/ldap\n"
        vars = splitvars(monitors[m]['text'])
        if 'BASE' in vars:
            output += "\tbase \"" + vars['BASE'] + "\"\n"
        if 'USER' in vars:
            output += "\tusername \"" + vars['USER'] + "\"\n"
        if 'PASS' in vars:
            output += "\tpassword \"" + vars['PASS'] + "\"\n"
        output += "}\n"
    if monitors[m]['type'] == 'icmp':
        output = "ltm monitor gateway-icmp " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/gateway-icmp\n}\n"
    if monitors[m]['type'] == 'DNS':
        output = "ltm monitor dns " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/dns\n"
        vars = splitvars(monitors[m]['text'])
        if 'HOST' in vars:
            output += "\tqname \"" + vars['HOST'] + "\"\n"
        if 'ADDR' in vars:
            output += "\trecv \"" + vars['ADDR'] + "\"\n"
        output += "}\n"
    if monitors[m]['type'] == '"Radius Accounting"':
        output = "ltm monitor radius-accounting " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/radius-accounting\n"
        vars = splitvars(monitors[m]['text'])
        if 'USER' in vars:
            output += "\tusername \"" + vars['USER'] + "\"\n"
        #if 'PASS' in vars:
        if 'SECRET' in vars:
            output += "\tsecret \"" + vars['SECRET'] + "\"\n"
        output += "}\n"
    if monitors[m]['type'] == '"Radius Authentication"':
        output = "ltm monitor radius " + partition + monitors[m]['name'] + " {\n\tdefaults-from /Common/radius\n"
        vars = splitvars(monitors[m]['text'])
        if 'USER' in vars:
            output += "\tusername \"" + vars['USER'] + "\"\n"
        #if 'PASS' in vars:
        if 'SECRET' in vars:
            output += "\tsecret \"" + vars['SECRET'] + "\"\n"
        output += "}\n"
    print (output)
    
################# output SNAT pool config  ######################
#
#
#############################################################
for s in snatPools.keys():
    output = "ltm snatpool " + partition + s + " {\n\t"
    output += "members {\n"
    #run through pool range and add members as individual IP addresses below each other
    for member in snatPools[s]['members']:
        output += "\t    " + member + "\n"
    output += "\t}"
    output += "\n}"
    print (output)    
################# output pool config  ######################
#
#
#############################################################
for p in pools.keys():
    output = "ltm pool " + partition + p + " {\n\t"        
    if 'monitor' in pools[p]:
        output += "monitor min 1 of { " + pools[p]['monitor'] + " }\n\t"
    if 'lbMethod' in pools[p]:
        output += "load-balancing-mode " + pools[p]['lbMethod'] + "\n\t"
    output += "members {\n"
    if 'destinations' in pools[p] and len(pools[p]['destinations']):
        for i,v in enumerate(pools[p]['destinations']):
            d = re.sub(':\d+$','',v)
            output += "\t\t" + v + " {\n\t\t\taddress " + d + "\n"
            if pools[p]['member-disabled'][i]:
                output += "\t\t\tstate down\n"
            output += "\t\t\tpriority-group " + str(pools[p]['priority-group'][i]) + "\n"
            output += "\t\t}\n"
    output += "\t}\n}"         
    print (output)
################# output virtual server config  ######################
#
#
######################################################################
for v in virtuals:
    output = "ltm virtual " + partition + v + " {\n"
    output += "\tdestination " + virtuals[v]['destination'] + "\n"
    output += "\tip-protocol " + virtuals[v]['protocol'].lower() + "\n"
    if 'pool' in virtuals[v] and virtuals[v]['pool']:
        output += "\tpool " + virtuals[v]['pool'] + "\n"
    if 'profiles' in virtuals[v] and len(virtuals[v]['profiles']):
        output += "\tprofiles {\n"
        for p in virtuals[v]['profiles']:
            output += "\t\t" + p + " { }\n"
        output += "\t}\n"
    if 'snat' in virtuals[v]:
        output += "\tsource-address-translation {\n\t"
        if virtuals[v]['snat'] == 'automap':
            output += "\ttype automap\n\t"
        else:
            output += "\ttype snat\n\t"
            output += "\tpool " + virtuals[v]['snat'] + "\n\t"
        output += "}\n"
    if 'policy' in virtuals[v]:
        output += "\tpolicies {\n\t"
        output += "\t" + virtuals[v]['policy'] + " { }\n\t}\n"
    output += "}"
    print (output)

Tested this on version:

12.0
Comments
Shahid-CRIS_355
Nimbostratus
Nimbostratus

Traceback (most recent call last): File "rad2f5", line 555, in vars = splitvars(monitors[m]['text']) KeyError: 'text'

 

PeteWhite
F5 Employee
F5 Employee

Thanks for the response Shahid-CRIS, I have fixed this - it was because of an uninitialized variable so it now creates the variable as an empty string if the text doesn't exist.

I have changed the file attached to the page so you can download and use that, or modify your own version as below: Line 157 or so:

if 'a' in opts:
    output['text'] = opts['a']
     Added in v2
else:
    output['text'] = ''
Shahid-CRIS_355
Nimbostratus
Nimbostratus

Thanks it worked

 

PeteWhite
F5 Employee
F5 Employee

Good! One point that i didn't make above is that the monitors are created but they are not assigned to the pools so you may want to do some manual assignment etc. This is because RadWare do monitor assignment to pool members and F5 generally do this at the pool level. I may look into fixing this.

 

If you have any issues with syntax etc then let me know and i'll amend it - I have only really used a couple of configs and the RadWare documentation is not very good about the CLI so if you have any configs that have issues or you want specific config included then PM me with the config and an explanation and i'll try to include it.

 

william_gonzalez
Altostratus
Altostratus

Hello,

 

I am executing the script but i get this :

 

-bash: ./rad2f5-tmsh.pl: /usr/bin/perl"^M: bad interpreter: No such file or directory

 

PeteWhite
F5 Employee
F5 Employee

Hi William, it looks like you have the wrong linefeeds in the file. Try looking through the script using vi and see if the lines have a ^M at the end. If so, transfer it to the platform using ASCII mode or copy/paste. Also, check that you have /usr/bin/perl as an interpreter for it to work. I built it on Cygwin.

 

PeteWhite
F5 Employee
F5 Employee

Hi William, it has just dawned on me that I wrote this in Python, not in Perl! haha

I think you also have rad2f5-tmsh.pl, my code is just rad2f5.

Try running it with

rad2f5  []

Avi_251195
Nimbostratus
Nimbostratus

Hi Pete,

Thanks for this; major help !

I ran the script - on a mac - to test it and I ran into this error (btw. I changed the file name and added the .py extension)

 Traceback (most recent call last):
   File "./rad2f5.py", line 403, in 
     if vars[1] and vars[1].startswith('P='):
 IndexError: list index out of range

First I ran into this error

 File "./rad2f5.py", line 72
  print "Using partition " + partition
                                ^
 SyntaxError: Missing parentheses in call to 'print'. Did you mean print("Using partition " + partition)?

I'm using Python 3.6.5 :: Anaconda, Inc. - I had to change all the print statements to surround them with ( ). Prolley a python distro/version specific thing. After the change the script ran fine until the line 403 error.

Appreciate the help.

Cheers, Avi

PeteWhite
F5 Employee
F5 Employee

Hi Avi,

 

There are two things here - one is about print and I can answer that now - I wrote this in Python v2.7 and i'm sure you know that print is one of the big differences between v2 and v3. I will look into this and change it to work correctly with v3.

 

On the failure point, I have a fair idea what the issue is - it's related to creating layer 7 rules and that part has quite a few options. Maybe you could PM me your config file and I will run it through and fix the issue.

 

Avi_251195
Nimbostratus
Nimbostratus

Hi Pete,

 

Thanks for the reply.

 

I'm not that deep into Python (yet) but I figured the print had something to do with different versions.

 

On the failure part - the source Radware config file had \ at the end of almost every line. I think it might have something to do with that. I got hinted by the monitor output of the script. So I'm editing the source config file to remove the backward slashes at the and and joining the config lines as one again.

 

Hopefully that will solve the issue for me. I'll let you know once the test file is done and ran the script against it - lot of config lines in there to be corrected 😞

 

PeteWhite
F5 Employee
F5 Employee

If you can send me the original file, I can change the script to manage the \ line endings - it is best for it to be as useful as possible. Should be simple with regex.

 

samuelovisua
Nimbostratus
Nimbostratus

Hi everybody, First of all, thanks Pete for sharing the script. I tried to execute but got the following error: --------- executed on windows 10 --------- Traceback (most recent call last): File "rad2f5_p3", line 426, in if rule in l7rules:

 

NameError: name 'rule' is not defined

I got the statistics output but nothing else, i mean, no config. Any clue whats happening? Thanks in advance! Br, Samuel.

 

PeteWhite
F5 Employee
F5 Employee

Hi Sam,

I know exactly what that is - it is a typo by me. I should have put speech marks in and left them out there and also two lines above it. You can fix this yourself by changing:

if rule in l7rules:

to:

if 'rule' in l7rules:

Do the same for

if not 'name' in l7policies:
a couplpe of lines above as well and that should fix it. I have been working on this script recently so feel free to download the latest version.

samuelovisua
Nimbostratus
Nimbostratus

Hi Pete, Thanks again! I'll have a try! Br, Samuel

 

Adriano_Pugedo1
Altostratus
Altostratus

I'm getting this issue:

 

#--------------------------------------#

Traceback (most recent call last):

 File "./rad2f5.py", line 630, in <module>

  if len(l7rules[j['rule']]['match']):

KeyError: '\\'

 

 

Can anyone help?

PeteWhite
F5 Employee
F5 Employee

Looks to me like it is looking for a key entry in an l7 rule. Maybe a comment in the config file? If not then feel free to PM me with the config file and i'll try it out myself.

Adriano_Pugedo1
Altostratus
Altostratus

Thank you Pete, I'm PM you with config file.

Adriano_Pugedo1
Altostratus
Altostratus

I think I found the issue: it was the size of the line

 

To run rad2f5 I had to break the line again:

 

Original

 

appdirector l7 farm-selection policy-table setCreate redirect_https 0 -m1 \

redirect_URL -pa PRSST=On|RDRS=www.mydomain.com.br|RDRC=PRMN|

 

After change

 

appdirector l7 farm-selection policy-table \ 

 setCreate redirect_https 0 -m1 \

redirect_URL -pa PRSST=On|RDRS=www.mydomain.com.br|RDRC=PRMN|

 

 

But it did not recognize the certificates

 

LACP trunks:1

IP routes:22

Non-floating IP interfaces:8

Floating IP interfaces:7

Monitors:0

Virtual Servers:7

Pools:67

SSL Certificates: 0

SSL Keys: 0

SSL profiles: 48

SNAT Pools:6

Layer 7 rules:201

Layer 7 policies:0

 

 

Any ideas?

PeteWhite
F5 Employee
F5 Employee

I have found the issue - there is a \\r\n after the normal \\n in your config file so i've added a line to the script to remove that. I suspect that it was added by your terminal. The way that the script works is to remove the linebreaks so that all of the relevant config is on the same line, it then breaks the line down into the options. Where this spreads across multiple lines it breaks the script.

I can see that there are no certificates in your config file.

Zee
Nimbostratus
Nimbostratus

is this Python script valid for Radware link proof. i tried to use the same script as encountered below error.

 

[root@mybigip:Active:Standalone] tmp # ./rad2f5.py

Traceback (most recent call last):

 File "./rad2f5.py", line 10, in <module>

  import ipaddress

ImportError: No module named ipaddress

[root@mybigip:Active:Standalone] tmp # ./rad2f5.py 20190820_HQLinkproof1_Config.txt>new.txt

Traceback (most recent call last):

 File "./rad2f5.py", line 10, in <module>

  import ipaddress

ImportError: No module named ipaddress

 

PeteWhite
F5 Employee
F5 Employee
Hi Zee, you need the ipaddress Python module, it is used for managing the SNAT pools. I haven’t tested it on linkproof, you are welcome to pm me the config.
Zee
Nimbostratus
Nimbostratus

Hi Peter, I can see the ipaddress inside python script but still getting the similar error. Possible to share your email address so i can forward the config for your testing

Maisha
Nimbostratus
Nimbostratus

Has anyone used this python script recently? I tried with "pip install rad2f5" then got lots of exception errors in the script

PeteWhite
F5 Employee
F5 Employee
Feel free to pm me with details and I’ll look into it
PeteWhite
F5 Employee
F5 Employee

@Maisha, I have installed v3.4 which is the most recent version:

$ pip install rad2f5==3.4
Collecting rad2f5==3.4
  Downloading rad2f5-3.4.tar.gz (12 kB)
Requirement already satisfied: ipaddress in ./lib/python3.6/site-packages (from rad2f5==3.4) (1.0.23)
Building wheels for collected packages: rad2f5
  Building wheel for rad2f5 (setup.py) ... done
  Created wheel for rad2f5: filename=rad2f5-3.4-py3-none-any.whl size=11994 sha256=d36f5a6f073090c4257d16553a1cf3bb1a43360596f2201eecffff33bfeaae71
  Stored in directory: /home/pwhite/.cache/pip/wheels/10/61/09/376e9091bd22dd3e8298fe56ee6aab02188ae0b28827f34345
Successfully built rad2f5
Installing collected packages: rad2f5
Successfully installed rad2f5-3.4

Maybe you can try again, if you still have issues then send me the output, or use the script which is attached to the page as I have just updated that with v3.4

Maisha
Nimbostratus
Nimbostratus

 It could not parse my txt file at all. Check my logs below

 

$ python rad2f5.py 208873asw2003_send.txt MyPartition

Running with Python v2.7.17 (default, Nov 7 2019, 10:07:09) 

[GCC 7.4.0]

Using partition /MyPartition/

LACP trunks:0

IP routes:0

Non-floating IP interfaces:0

Floating IP interfaces:0

Monitors:0

Virtual Servers:0

Pools:0

SSL Certificates: 0

SSL Keys: 0

SSL profiles: 0

SNAT Pools:0

Layer 7 rules:0

Layer 7 policies:0

 

PeteWhite
F5 Employee
F5 Employee
Ok, maybe you can pm me your config and I’ll try it out myself Regards Peter White T: 07785 456991
Tejas
Nimbostratus
Nimbostratus

 It could not parse my txt file at all. Radware Alteon  version  30.5.13.0

I am getting below output.

 

d:\>rad2f5.py altconfig.txt

Running with Python v3.8.5 (tags/v3.8.5:580fbb0, Jul 20 2020, 15:43:08) [MSC v.1926 32 bit (Intel)]

LACP trunks:0

IP routes:0

Non-floating IP interfaces:0

Floating IP interfaces:0

Monitors:0

Virtual Servers:0

Pools:0

SSL Certificates: 0

SSL Keys: 0

SSL profiles: 0

SNAT Pools:0

Layer 7 rules:0

Layer 7 policies:0

 

 

 

 

 

 

#     Configuration

#--------------------------------------#

PeteWhite
F5 Employee
F5 Employee
Hi Tejas, Are you able to PM me the config file? Regards, Pete
Tejas
Nimbostratus
Nimbostratus

  Thanks a lot. Appreciated your efforts.

Version history
Last update:
‎06-Jun-2023 12:24
Updated by: